Need help with Reflection paper

I need a Reflection paper regarding Tech and Egaming on this Video Link.

1-2 pages | Double Spaced | APA format | at least 3 references

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Capstone Project PowerPoint Presentation

 

This capstone course will require a BEST PRACTICES PRESENTATION which will consist of a PowerPoint presentation. The project presentation will be a detailed presentation worth 100 points that will be due at the end of the 6th week. 

The project presentation should demonstrate knowledge in the chosen area. The presentation should be formatted as follows:

Apply a Design Theme of your choice 

Use APA style correctly throughout the presentation

Use correct grammar and punctuation

Format correctly and consistently

Include a title slide (introduction slide) at the beginning of the presentation and a conclusion slide at the end of the presentation, and a reference slide using APA format at the end of the presentation.

Number all slides beginning with the title slide as slide 1

Utilize 10 references from scholarly sources…do NOT use Wikipedia (one source can be the textbook)

Cite references within the presentation using correct APA format

Include a minimum of 16 slides which will include the cover and reference slides

Include at least one figure or one table in the presentation and format in APA style

Highlight your knowledge of technology by including transition and animation

The BEST PRACTICE PRESENTATION can be chosen from one of the following topics:

• Business process and IT outsourcing

• Collaboration tools

• E-commerce

• Enterprise systems

• Business intelligence and big data

• Knowledge management

• IT security

• Project management

• Disaster recovery planning

• Managing information systems

• Web-based training systems

• Software testing and quality assurance

• Document and records management systems

• Mobile application and mobile learning

• Other possible topics with professor permission

Choose a topic in which you are interested and in which you have prior knowledge. Research best company practices for the particular topic. Use at least 10 references from scholarly sources.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Free Music and Videos Discussion

 

Hundreds of millions of songs and videos are illegally downloaded every month and about one-quarter of all Internet users have downloaded a movie from the Internet. Research this topic and post your answers to the following questions in this Free Music and Videos discussion:

  • What do you think might happen if this situation doesn’t change?
  • Is downloading music or videos without paying any different ethically than shoplifting CDs or DVDs from a store? Why or why not?
  • Is there a solution to this problem that could make everyone happy?

Include in your post at least two sources (books, magazines, scholarly journals, newspapers, web sites). List your sources at the end of your essay using either the APA Citation Style (Links to an external site.) or MLA Citation Style. (Links to an external site.) Then, clearly relate your sources to your essay by including the author’s last name after the sentence or paragraph where you referred to the source (Highlight or boldface the author’s last name so I can find it easily within your essay). This should be done for each source. Note that Wikipedia cannot be used as a direct source.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

computer forencies

 

  • Read and follow instructions below.

<Important files and folders to install>

  1. Download image files from
  2. https://www.cfreds.nist.gov/FileCarving/Images/L0_Graphic.dd.bz2
  3. https://www.cfreds.nist.gov/FileCarving/Images/L2_Graphic.dd.bz2
  4. Download and install Autopsy program from https://www.sleuthkit.org/autopsy/ on your computer
  5. Download TRID ( http://mark0.net/download/trid_w32.zip ) to your computer.
  6. You need the TRID package file     http://mark0.net/download/triddefs.zip   together with TRID.
  7. Download the attached file named “unnamed.zip”.
  • Short answers are not acceptable.
  • Screenshots of your findings are must.

<Assignment >

  1. Explain what file signature and file header (refer to https://www.garykessler.net/library/file_sigs.html).
  2.  Explain Data Carving and its techniques.
  3. Import two dd image files extracted from bz2 files to Autopsy and run ‘Ingest Module’ on ‘PhotoRec Carver.’
  4. List all carved files from each dd image file.
  5. Choose a carved file from both dd images that has a same extension and file size. Show the header value indicating file size in Hex.
  6. Do you think that these 2 files are originally same or not? Why?

4.Using TRID, find each extension of all files extracted from ‘unnamed.zip.’

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

You are the web master of a college website. You share a server with other school departments such as accounting and HR

 create at least five rules for staff members who are adding web pages being added to your site. Include a justification and explanation for each rule. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Programming 3 LAB4

Contents

COSC 2436 – LAB4

TITLE ………………………………………………………………………………………………………………………………………….. 1 TIME TO COMPLETE …………………………………………………………………………………………………………………….. 1 COURSE OBJECTIVES – LEARNING OUTCOME …………………………………………………………………………………. 1 LAB OBJECTIVES ………………………………………………………………………………………………………………………….. 2 SKILLS REQUIRED…………………………………………………………………………………………………………………………. 2 HOW TO DO EACH PART ………………………………………………………………………………………………………………. 2 REQUIREMENT ……………………………………………………………………………………………………………………………. 3

LAB4 PART1 …………………………………………………………………………………………………………………………….. 3

LAB4 PART2 …………………………………………………………………………………………………………………………….. 4 HOW TO TURN IN THE LAB …………………………………………………………………………………………………………… 6 HOW TO GRADE THE LAB……………………………………………………………………………………………………………… 6

Note: in the instruction of the lab change “yourLastName” to your last name. In the example, change Smith to your last name, change James Smith to your full name, change Mary Lane to the name that users type in from the keyboard (if these words are in this instruction)

TITLE

Restricted Data Structure: Stack and Queue -Evaluating the infixed Math expression

TIME TO COMPLETE

Two week

COURSE OBJECTIVES LEARNING OUTCOME

[LO1]
Provide UML class diagram and the code of data type classes
Provide the pseudo-code or flowchart based on the requirement of a project before writing the code of the driver class. Also, can access data members of data type classes
Describe and implement the inheritance relationship between super class and child classes.
Can use abstract classes or interface and apply polymorphism to the real life problem project

[LO3]
Describe and implement operations of Stack and Queue structures. Using Stack/Queue to the real life problem project

LAB OBJECTIVES

-Complete the lab on time (Time Management) -Can write the pseudo-code

-Can provide UML of data type class
-Can write comments in the program
-Can write the code of data type classes including data members, no-argument constructor, parameter constructors, mutator methods, assessor methods, method toString and other methods
-Can apply Inheritance concept to write the code of child classes that inherits data members, constructors and other methods from parent class
-Can apply Polymorphism: using object of the parent class to point to object of child classes
-Can organize the program with selection control structure: if..else, switch, do..while
-Can create object and can access members of data type class
-Can create the data structure type of Stack and Queue
-Can implement push/enqueue nodes, peek, pop/dequeue and show all nodes with Stack/Queue

SKILLS REQUIRED

To to this lab, students should review all the concepts required from the previous lab and add the following skills: -Learn how to create the data structure of type Stack and of type Queue
-Learn the algorithms of the operations, push and pop of Stack – enque and deque of Queue to see how the process work. Also, learn how to access these operation to insert, remove the node

-Learn how to fetch the node from Stack and Queue by writing the method peek() -Learn how to show all the nodes in the Stack or Queue by writing the method showAll() -Learn how to write the generic code and apply to write the code for a generic stack -Learn how to declare an object of a generice class with specific data type

HOW TO DO EACH PART

From now and on yourLastName will be changed to your last name

*Step1:
-Create UML of data type classes: reuse from lab3 for class Account, CheckingAccount and SavingAccount
-Read the requirement of each part; write the pseudo-code in a word document by listing the step by step what you suppose to do in main() and then save it with the name as Lab4_pseudoCode_yourLastName

*Step2:
-start editor eClipse, create the project→project name:

FA2019_LAB4PART1_yourLastName(part1) OR FA2019_LAB4PART2_yourLastName (part2) -add data type classes (You can use these classes from lab3)

Account_yourLastName.java CheckingAccount_yourLastName.java SavingAccount_yourLastName.java

-Add data structure class:
Stack_yourLastName and Queue_yourLastName (part 1) GenericStack_yourLastName (part2)

-Add the driver class
FA2019_RestrictedStructureDemo_yourLastName (part1) FA2019_EvaluatingInfixedExpression_yourLastName (part2)

*Step3: Write the code of classes:
Re-use the code of data type classes from lab3
Write the code of Stack_yourLastName and Queue_yourLastName (Part1) -using the code on the page 140

And page 160 in the text book for your reference
Write the code of GenericStack_yourLastName (part2) – Using the code on the page 165 in the text book

for your referece with the following notices: Line 8: data = new T [100];

Line13: data = new T [n];
Line20: data[top] = newNode; (just for this lab)

Based on the pseudo-code write the java code of main() of the driver class FA2019_RestrictedStructureDemo_yourLastName (part1) or FA2019_EvaluatingInfixedExpression_yourLastName (part2)

*Step4: compile and run the program
*Step5: debug if there is any errors to complete the program

REQUIREMENT

LAB4 PART1

DATA TYPE CLASSES:
Using the data type classes from lab3:
-class Account_yourLastName
-class CheckingAccount_yourLastName
-class SavingAccount_yourLastName
Using the code on the page from the text book for your reference to produce the class Stack_yourLastName and Queue_yourLastName. Add the code of the following method to Stack_yourLastName or Queue_yourLastName

//This method should be added to Stack_yourLastName public Account_Smith peek()
{

if (top != -1) {

return data[top].deepCopy(); }

return null; }

//This method should be added to Queue_yourLastName public Account_Smith peek()
{

If (numberOfNode !=0) {

return data[front].deepCopy(); }

return null; }

DRIVER CLASS
Provide the pseudo-code or flowchart then write the code for the application FA2019_RestrictedStructureDemo_yourLastName that first display the following menu to select types of data structure:

FA2019_RestrictedStructureDemo_Smith_Smith.java MAIN MENU

  1. Stack Structure
  2. Queue Structure

0. Exit

FOR EACH TYPE OF RESTRICTED STRUCTURE DO THE FOLLOWING TASKS SEQUENTIALLY:

INSERT 3 NODES TO THE STRUCTURE
Ask for the information and read from the keyboard for either CheckingAccount or SavingAccout For each one, insert the account to the data structure.
If Insert successfully display the message “Insert Account success”
Otherwise: display the message: “Insert Accout failed”

DELETE 1 NODE

Remove the node at the top (Stack) or at the front (Queue)
If the node exists, display the information of the node; otherwise display the message: “There is no account in the data structure”

DISPLAY THE NODE AT THE TOP (Stack) / AT THE FRONT (Queue)

Display the node at the top (Stack) or at the front (Queue)
If the node exists, display the information of the node, otherwise display the message: “Stack is empty” or “Queue is empty”

SHOW ALL NODES
Display all the accounts currently stored in the data structure

You should re-display the menu to allow users to continue using your program until they want to exit

LAB4 PART2

Create an application that can help users to evaluate the infixed expression
First, display the menu to allow users select the method where to read the input expression:

FA2019_EvaluatingInfixedExpression_Smith.java MENU TO SELECT WHERE TO READ INPUT
1. Read one Expression from the keyboard
2. Read expressions from an input file

0. Exit

CASE 1: //input from the keyboard

Reading one expression from the keyboard as a string

Do the following algorithm for one expression that include: create 2 stacks, split the expression into tokens, phase 1, phase 2 and display the result:

CREATE TWO STACKS: stackForOperands is for storing the operands (Integer) and stackForOperators is for storing operators (Character)
SPLIT THE EXPRESSION INTO TOKENS
-Using StringTokenizer to split the string of expression into the tokens (either they are operands or operators)

PHASE1: Read each token of the expression from left to right and store them to stack of operands (numbers) and stack of 6 operators: + – * / ( ) by applying the following rules:

  • if the token is a NUMBER, push it to the stackForOperands
  • if the token is AN OPEN PARENTHESIS ”(“, push it to the stackForOperators
  • if the token is AN CLOSE PARENTHESIS “)”, do the following:
    Create a loop, access the method processOfOneOperator() until the top of stackForOperators is the OPEN PARENTHESIS “(”, pop it off
  • if the token is one of 2 operators + or – , do the following: Check the top of stackForOperators:
    –if the top is one of 4 operator + – * / then call the method processOfOneOperator() –If at the top of stackForOpertors there is nothing
    or something not one of 4 operators + – * / then push it in
  • if the token is one of 2 operators * or /, do the following: Check the top of stackForOperators:
    –if the top is one of 2 operator * / then call the method processOfOneOperator() –If at the top of stackForOpertors there is nothing
    or something not one of 2 operators * / then push it in
    PHASE 2: CLEARING THE stackForOperators
     Create the loop to call the method processOfOneOperator() until stackForOperators is empty
    DISPLAY THE RESULT FOR THE INPUT FROM THE KEYBOARD

• The format of the output result as below, the expression is the input string and the result is the last number that is popped from the stackForOperands

Expression = result
For example the output of the expresion (25 + 63 – 12) * 20 – (8 * 12) is:

FA2019_EvaluatingInfixedExpression_Smith.java EXPRESSION FROM THE KEYBOARD
(25 + 63 12) * 20 (8 * 12) = 1424

CASE 2: //Input from the file

Read file name Open input file Loop to read the file

Read each line of file as an input string that is one expression

For each expression: Do the following algorithm that include: create 2 stacks, split the expression into tokens, phase 1, phase 2 and display the result as you did for one expression that is read from the keyboard

DISPLAY THE RESULT FOR THE INPUT FROM THE FILE

• The format of the output result as below, the expression is the input string and the result is the last number that is popped from the stackForOperands

Expression = result
For example the output of the file expresions.txt as below: (file expressions.txt is downloaded from eCampus)

FA2019_EvaluatingInfixedExpression_Smith.java EXPRESSION FROM THE INPUT FILE expressions.txt 23 + 28 = 51
64 * 25 = 1600

14 + 25 12 = 27
36 * 14 / 42 = 12
25 + (12 + 34 * 23) = 819 (25+63–12)*20–(8*12) = 1424

HOW TO TURN IN THE LAB

Part 1: (you can zip whole part 1 folder into one .zip file to submit part1) Pseudo-code of part 1
Account_yourLastName.java
CheckingAccount_yourLastName.java SavingAccount_yourLastName.java

Stack_yourLastName.java
Queue_yourLastName.java FA2019_RestrictedStructureDemo_yourLastName.java

Account_yourLastName.class CheckingAccount_yourLastName.class SavingAccount_yourLastName.class Stack_yourLastName.class
Queue_yourLastName.class FA2019_RestrictedStructureDemo_yourLastName.class

Part2: (you can zip whole part 2 folder into one zip file to submit part 2 Pseudo-code of part 2
GenericStack_yourLastName.java FA2019_EvaluatingInfixedExpression_yourLastName.java

GenericStack_yourLastName.class FA2019_EvaluatingInfixedExpression_yourLastName.class

HOW TO GRADE THE LAB

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Cruisin’ Fusion, Part 2

  

Part A: Ch. 6 Role Playing Sim: Cruisin’ Fusion

In this simulation, you will understand how to develop a website for a chain of concession stands you inherited from Uncle Al. You’re not sure what to do with the concession truck, but a couple of your friends think Al was onto something with his unusual taco food truck. They want to partner with you to expand, targeting sports events, outdoor concerts, political rallies, holiday marches, and other events where customers might pay a little more for a very distinctive and healthier meal. With the right marketing, this could be a promising business venture.

Refer to Cruisin’ Fusion, Part A in Week 2.

The Crusin’ Fusion taco trucks are gaining popularity, fueling a demand for an order-ahead option on the website. After careful consideration, the team has decided to add shopping cart software to the Cruisin’ Fusion website to meet this demand. 

Research various shopping cart software to determine the best choice for website.

Write a 1- to 2-page blog post to launch this new feature and to reassure your customers that placing online orders is safe. In addition to introducing the order-ahead option, your blog post should:

  • Analyze how the new shopping cart software upholds ethical trends in consumer privacy.
  • Examine ethical considerations for maintaining confidentiality and consumer data.
  • Describe the various privacy regulations upheld with the shopping cart software.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Webstore Implementation and Maintenance Plan

 

Pine Valley Furniture’s board of directors is ready to review how to implement and maintain the new webstore system.

Write a 6- to 8-page implementation and maintenance plan for the new webstore. Include the following:

Recommend an  installation strategy for PVF’s student furniture webstore. Justify  your recommendation by stating the advantages and disadvantages as  compared to the other three installation strategies.

Outline the documentation that you would suggest being created to document the system, train, and support users.

Outline the testing plan for the system. Include brief descriptions of the activities for each element of your testing plan.

Summarize the  maintenance needs of the PVF webstore, including alternative  organizational structures, quality measurement, processes for handling  change requests, and configuration management.

Cite any references according to APA guidelines.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Powershell Basic Script question

Create a script, which has the following features and functionality listed below.  

  1. Comment block: Set up comments using the standard format in a <# and #> container, which should contains a synopsis, description, and at least one example which shows how to run the script.
  2. Set up an array: Put values in the array $ComputerNames, containing the names of two computers: DC1 and W10-CLIENT.
  3. Prompt for user’s name: Use the text Please enter your first name, store the value the user will provide in a variable named $FirstName, and write out the text Hello followed by a space, followed by the name entered.
  4. Prompt for report type, and store value provided: Ask the user to enter AD if the information on Active Directory Users is required, and WMI for Windows Machine Instrumentation. Store the answer provided in variable $ReportType 
  5. Confirm report selection: If an Active Directory report was requested, on a new line print the message “A list of all AD users was requested for computers ” followed by the contents of the $ComputerNames array. If a Windows Machine Instrumentation report was request, on a new line write the message “A list of all processes was requested.”
  6. Print a “Thank You” Message on a new line: Before stopping, the script should display the message Thank you followed by a space then the value in  variable $FirstName followed by another space and the text for using this program.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

cyb-690

Implement a security framework to identify and close gaps between an organization’s current cybersecurity status and its target (future) cybersecurity status. Make sure to align to an appropriate regulation (e.g., PCI DSS, HIPAA, SOX, GLBA). In CYB-650, the NIST Cybersecurity Framework was utilized, and therefore it cannot be utilized for this assignment.

Develop a report that addresses the following:

Organizational Objectives and Priorities

  1. Current Framework Compliance Status: Describe the current cybersecurity environment, such as processes, information, and systems directly involved in the delivery of services. Describe the current risk management practices, threat environment, legal and regulatory requirements, business/mission objectives, and organizational constraints using the framework identified. Include a diagram related to the common workflow of information and decisions at the major levels within the organization.
  2. Future Cybersecurity Policy Implementations: Describe the critical cybersecurity needs that should be in place to ensure compliance with the appropriate regulation (e.g., PCI DSS, HIPAA, SOX, GLBA) and then prioritize organizational efforts, business needs, and outcomes.

Operational Compliance and Risk Assessment

  1. Cybersecurity Risk Assessment: Describe the likelihood of risks occurring and the resulting impact. Identify threats to, and vulnerabilities of, those systems and assets. Express risks both internally and externally. Determine the acceptable level of risk (risk tolerance). Describe the response to the risk. Describe how identified risks are managed and resolved. Include an Organizational Risk Assessment Chart.
  2. Privacy Risk Management: Describe how the business is integrating privacy laws and regulations, prioritizing, and measuring progress.
  3. Compliance Gaps: Describe the type of audits that should be performed in order to keep a consistent measure of risk. Determine what type of gap analysis should be performed in order to properly identify the security elements and variables within the environment that pose the most risk. Formulate a cybersecurity governance strategy that establishes mitigation plans to achieve security objectives.
  4. Web Portal Diagram: Create a web portal data flow diagram of the hypothetical organization’s operational environment using Visio or a similar diagramming software. Within the web portal data flow diagram, students will show how the web portal is compliant. The web portal data flow diagram must: a) Display the organization’s technical requirements (related and unrelated applications, services, and links); b) display the compliance of associated servers, routers, access-control components, data storage, internal and external data communication, data backup, e-mail servers, and so forth; c) identify related systems and assets, regulatory requirements, and overall risk approach; and d) demonstrate each IT task to the next as aligned to regulations/compliance (e.g., start with the user logging in, and then go through each step and how it is validated.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now